Achtung! Das Lehrangebot ist noch nicht vollständig und wird bis Semesterbeginn laufend ergänzt.
052012 VU Software Security (2023W)
Prüfungsimmanente Lehrveranstaltung
Labels
An/Abmeldung
Hinweis: Ihr Anmeldezeitpunkt innerhalb der Frist hat keine Auswirkungen auf die Platzvergabe (kein "first come, first served").
- Anmeldung von Mi 13.09.2023 09:00 bis Mi 20.09.2023 09:00
- Abmeldung bis Sa 14.10.2023 23:59
Details
max. 25 Teilnehmer*innen
Sprache: Englisch
Lehrende
Termine (iCal) - nächster Termin ist mit N markiert
- Mittwoch 04.10. 11:30 - 13:00 Hörsaal 1, Währinger Straße 29 1.UG
- Montag 23.10. 09:45 - 13:00 PC-Seminarraum 3, Kolingasse 14-16, OG02
- Montag 13.11. 09:45 - 13:00 PC-Seminarraum 3, Kolingasse 14-16, OG02
- Montag 27.11. 09:45 - 13:00 PC-Seminarraum 3, Kolingasse 14-16, OG02
- Montag 11.12. 09:45 - 13:00 PC-Seminarraum 3, Kolingasse 14-16, OG02
- Montag 08.01. 09:45 - 13:00 PC-Seminarraum 3, Kolingasse 14-16, OG02
- Montag 22.01. 09:45 - 13:00 PC-Seminarraum 3, Kolingasse 14-16, OG02
Information
Ziele, Inhalte und Methode der Lehrveranstaltung
Students learn which methods exist for protecting software against reverse engineering and how they can be integrated into a software development process. For this purpose, algorithms for code obfuscation (protection against program analysis), software watermarking and fingerprinting (protection against unauthorized distribution), and software tamperproofing (protection against modification) are discussed. Furthermore, students become familiar with the basics of program analysis and know which techniques are used to perform reverse engineering attacks on programs. Students learn to evaluate the strength of a protection technique based on potency, resilience, stealth, and cost.
Art der Leistungskontrolle und erlaubte Hilfsmittel
The grading will follow the following scheme:
- 4 practical assignments (15% each); 60% in total
- Written closed-book exam (multiple-choice) on the course content (40%)
- 4 practical assignments (15% each); 60% in total
- Written closed-book exam (multiple-choice) on the course content (40%)
Mindestanforderungen und Beurteilungsmaßstab
theoretical and practical knowledge on how software can be protected against reverse engineering; basic binary reverse engineering knowledgeGrading:
=IF(B2>89;1;IF(B2>79;2;IF(B2>64;3;IF(B2>49;4;5))))
=IF(B2>89;1;IF(B2>79;2;IF(B2>64;3;IF(B2>49;4;5))))
Prüfungsstoff
Written exam:
All contents that are being presented in the lectures, including the slides, pictures and diagrams drawn on the board, oral clarifications of the lecturers and the book.Assignments:
4 hands-on assignments (individual work)
All contents that are being presented in the lectures, including the slides, pictures and diagrams drawn on the board, oral clarifications of the lecturers and the book.Assignments:
4 hands-on assignments (individual work)
Literatur
Nagra, J., & Collberg, C. (2009). Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection. Pearson Education.
Zuordnung im Vorlesungsverzeichnis
Letzte Änderung: So 24.09.2023 13:47